ACNSĄŻ04 PROGRAM ¨C Academic Track



Day 1 (Tuesday, June 8)


Opening Ceremony (Chair: Thomas Berson)


Session 1: Security and Storage (Chair: Robert Deng)


                CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems

on the Cheap

Michael E. Locasto and Angelos D. Keromytis


                Private Keyword-Based Push and Pull with Applications to Anonymous Communication

Lea Kissner and Alina Oprea and Michael Reiter and Dawn Song and Ke Yang


                Secure Conjunctive Keyword Search over Encrypted Data

Philippe Golle and Jessica Staddon and Brent Waters


Session 2: Provably Secure Constructions (Chair: Markus Jakobsson)


                Evaluating Security of Voting Schemes in the Universal Composability Framework

Jens Groth


                Verifiable Shuffles: A Formal Model and a Paillier-based Efficient Construction with

Provable Security

Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa


                On the Security of Cryptosystems with All-or-Nothing Transform

Rui Zhang and Goichiro Hanaoka and Hideki Imai


Session 3: Internet Security (Chair: Jianying Zhou)


                Centralized Management of Virtual Security Zones in IP Networks

Antti Peltonen and Teemupekka Virtanen and Esa Turtiainen


                S-RIP: A Secure Distance Vector Routing Protocol

Tao Wan and Evangelos Kranakis and Paul Van Oorschot


                A Pay-per-Use DoS Protection Mechanism for the Web

Angelos Stavrou and John Ioannidis and Angelos D. Keromytis and Vishal Misra and

Dan Rubenstein


Session 4: Digital Signature (Chair: David Naccache)


                Limited Verifier Signature from Bilinear Pairings

Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim


                Deniable Ring Authentication Revisited

Willy Susilo and Yi Mu


                A Fully-Functional Group Signature Scheme over Only Known-Order Group

Atsuko Miyaji and Kozue Umeda


Day 2 (Wednesday, June 9)


Session 5: Security Modeling (Chair: Moti Yung)


                Some Observations on Zap and Its Applications

Yunlei Zhao and C. H. Lee and Yiming Zhao and Hong Zhu


                Security Measurements of Steganographic Systems

Weiming Zhang and Shiqu Li


                X2Rep: Enhanced Trust Semantics for the XRep Protocol

Nathan Curtis and Rei Safavi-Naini and Willy Susilo


Session 6: Authenticated Key Exchange (Chair: Atsuko Miyaji)


                One-Round Protocols for Two-Party Authenticated Key Exchange

Ik Rae Jeong and Jonathan Katz and Dong Hoon Lee


                Password Authenticated Key Exchange Using Quadratic Residues

Muxiang Zhang


                Key Agreement using Statically Keyed Authenticators

Colin Boyd and Wenbo Mao and Kenneth G. Paterson


Session 7: Security of Deployed Systems (Chair: Philippe Golle)


                Low-Latency Cryptographic Protection for SCADA Communications

Andrew K. Wright and John A. Kinast and Joe McCarty


                A Best Practice for Root CA Key Update in PKI

InKyoung Jeun and JongWook Park and TaeKyu Choi and SangWan Park and

BaeHyo Park and ByungKwon Lee and YongSub Shin


                SQLrand: Preventing SQL Injection Attacks

Stephen W. Boyd and Angelos D. Keromytis


Session 8: Cryptosystems: Design and Analysis (Chair: Rana Barua)


                Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem

Bin Zhang and Hongjun Wu and Dengguo Feng and Feng Bao


                Success Probability in c2-attacks

Takashi Matsunaka and Atsuko Miyaji and Yuuki Takano


                More Generalized Clock-Controlled Alternating Step Generator

Ali A. Kanso

Day 3 (Friday, June 11)


Session 9:Cryptographic Protocols (Chair: Angelos D. Keromytis)


                FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy

Daisuke Inoue and Masahiro Kuroda


                Unconditionally Non-Interactive Verifiable Secret Sharing Secure Against

Faulty Majorities in the Commodity Based Model

Anderson C. A. Nascimento and Joern Mueller-Quade and Akira Otsuka and

Goichiro Hanaoka and Hideki Imai


                Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and

An Improvement for True Anonymity

Bok-Min Goi and Raphael C.-W. Phan and Yanjiang Yang and Feng Bao and

Robert H. Deng and M. U. Siddiqi


Session 10: Side Channels and Protocol Analysis (Chair: Feng Bao)


                Security Analysis of CRT-based Cryptosystems

Katsuyuki Okeya and Tsuyoshi Takagi


Cryptanalysis of the Countermeasures using Randomized Binary Signed Digits

Dong-Guk Han and Katsuyuki Okeya and Tae Hyun Kim and

Yoon Sung Hwang and Young-Ho Park and Souhwan Jung


                Weaknesses of a Password-authenticated Key Exchange Protocol Between Clients

with Different Passwords

Shuhong Wang and Jie Wang and Maozhi Xu


Session 11: Intrusion Detection and DoS (Chair: Teemupekka Virtanen)


                Advanced Packet Marking Mechanism with Pushback for IP Traceback

Hyung-Woo Lee


                A Parallel Intrusion Detection System for High-Speed Networks

Haiguang  Lai and Shengwen  Cai and Hao Huang and Junyuan Xie and Hui Li


                A Novel Framework for Alert Correlation and Understanding

Dong Yu and Deborah Frincke


Session 12: Cryptographic Algorithms (Chair: Jens Groth)


                An Improved Algorithm for uP+vQ using JSF_3

Bai-Jie Kuang and Yue-Fei Zhu and Ya-Juan Zhang


                New Table Look-up Methods for Faster Frobenius Map Based Scalar Multiplications

over GF(pn)

Palash Sarkar and Pradeep Kumar Mishra and Rana Barua


                Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions

Riza Aditya and Kun Peng and Colin Boyd and Ed Dawson and Byoungcheon Lee